Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2017, International journal of engineering research and technology
…
6 pages
1 file
Steganography is the art of hiding information to prevent the detection of hidden messages. Cryptography can be defined as the conversion of plain text into a scrambled code. Both are two general ways of sending vital information in a secret way. A message in scrambled code aka cipher text, might arouse suspicion on the part of the recipient while an invisible message created with steganographic methods will not. But many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for a steganographic message. In this paper, we present a new steganographic technique to hide data inside an image. The newly planned technique withstands visual and statistical attacks, yet it still offers a large steganographic capacity. This method does not modify the image. Message to be hidden will be converted into a bit stream and divided into several blocks. The bit pattern of each block is identified inside the im...
2014
Now a day’s Steganography plays an important role in defence, public sectors works and internet. Cryptography created as a technique for securing the secrecy of communication and many different methods have been developed to encrypt, decrypt data in order to keep message secret .Unfortunately sometimes it may not be enough to keep the contents of a message secret .It may also be necessary to keep the existence of the message secret .The technique used to implement this is called Steganography and it different from cryptography in the sense cryptography focuses on keeping contents of a message secret Steganography focuses on keeping the existence of message secret for more security we proposed new methods that combines with both cryptography and Steganography. There are two types of techniques are implemented, The first technique implemented sequentially starting with the top left pixel and then encodes information from top to bottom and left to right, and another techniques implemen...
2013
In this paper we hide the message (data), using the concept of Steganography; in such a way that on-one apart from the sender and intended recipient even realizes there is a hidden message. The proposed method hides the secret message based on searching about the identical bits between the secret messages and image pixels values. The new approach is based on the LSB (Least Significant Bit) method. Also a new approach is proposed to securely sending the message using Cryptographic concept in Steganography. From the sender side the encrypted message is send and hides it in a saved picture and encodes the message. At the receiver side decryption is done to get original message.
In today's world lots of data are being corrupted so, for a secure message transfer we need Steganography .It is the method of hiding information in other information. Other file formats such as of audio or video format can also be used, but because of their frequency on the internet, digital images are more popular. There are variety of steganography technique that are used for hiding secret information and are more complex than others while all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its use and techniques. It also helps to choose which stegnographic technique are suitable for which application and also attempts to identify the requirements of a good steganography algorithm.
The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the robustness of the applied algorithm. In this paper, we compress the secret message and encrypt it by the receiver's public key along with the stego key and embed both messages in a carrier using an embedding algorithm. The stego -image is the result we get by running the algorithm you select on the message (file to hide) and cover (image). It can be saved into BMP or PNG format. The reason that it can only be saved in these formats is because they are lossless -there is no information lost as part of the file formatting. The various applications of steganography include secure military communications, multimedia watermarking and fingerprinting applications for authentication purposed to curb the problem of digital piracy.
IJEMR, 2014
With the increasing population, trend of internet increases and mostly people share their secret information or data through internet. Hence, there are more chances for intruders to attack on system and acquire that secret information. In such a case, security becomes the more important feature to provide data security while sharing secret information. This paper provides data security by hiding data or secret information within an image file by using Steganography. Data hiding has become a critical security feature for thriving networks and active home users alike. In simple terms, Steganography hides the secret information so it can not be seen. After using this technique, the secret information or data can only be decoded or decrypted by the authorized person.
Journal of emerging technologies and innovative research, 2018
The quick advancement in the exchange of information through internet made it easier to exchange information exact and faster to the receiver. Security of data is one of the huge components of information technology and communication. Steganography is a term used for information hiding and it is an art of hidden writing. In steganography we hide information with a multimedia carrier i.e. image, text, audio, video files, etc. So, that observer cannot find the hidden information which we want to send to the receiver. Steganography main objective is to provide robustness, detectability, capacity of hidden data due to which it differs from other techniques such as watermarking and cryptography. This paper proposes a various technique used to hide information on image by an image steganography. In image steganography we hide our secret data in image so that the observer cannot feel its existence. Image steganography strategies are as of late been useful to send any secret message in the ...
In the present scenario, any communication of internet and networks application requires security.Lots of data security and data hiding algorithms have been developed in the last decade.Cryptography and steganography are the two major techniques for secret communication.In this paper,the secret image is first encrypted by using BLOWFISH algorithm which has very good performance and is a most powerful technique compared to other Algorithms. Now this encrypted imageis embedded with videoby using LSB Approach of steganography. Our proposed model gives two layers of security for secret data, which fully satisfy the basic key factors of information security system that includes: Confidentiality, Authenticity, Integrity and Non -Repudiation.
destroying the property of the file significantly. The proposed bit exchange is reversible, i.e. the decryption is done in the reverse way of the encryption. The authors applied the present steganography algorithm on image files and the result found was satisfactory.
2010
In this paper we present a technique for secure communication between two parties Alice and Bob. We use both cryptography and steganography. We take image as the carrier to use steganography. By using our own substitution cipher called two square reverse we encrypt the secret information. Then the cipher text of the secret information is embedded into the carrier image in LSB (least significant bit) minus one position of some selected bytes. The byte selection is done depending on the bit pattern of the secret information. Thus the embedding locations are dependent on the secret message. So the intruder will face difficulties to locate the bits. After embedding the resultant image will be sent to the receiver, the receiver will apply the reverse operation what the sender has done and get the secret information.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Ijca Proceedings on National Conference on Communication Technologies Its Impact on Next Generation Computing 2012, 2012
International journal of engineering research and technology, 2019
IJCRT(www.ijcrt.org), 2020
International Journal of Computer Applications, 2013
International Journal of Advanced Computer Science and Applications, 2011
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
International Journal on Data Science and Technology, 2017
International Journal of Recent Technology and Engineering (IJRTE), 2019
Two New Approaches for Image Steganography Using Cryptography, 2015
Ijca Special Issue on International Conference on Computing Communication and Sensor Network, 2013
International Journal of Engineering Research and Advanced Technology , 2020